Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Monitoring and Tracking Application Usage

Active Publication Date: 2011-07-14
ACCENTURE GLOBAL SERVICES LTD
View PDF11 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0018]In some cases, the first data sheet, the second data sheet or both data sheets may be transmitted to a central location, e.g. via email or some other suitable network protocol. Optionally, the transmitted data sheets may be processed using a rule or macro. The rule may consolidate information from the data sheets in order to generate a report, e.g. a summary report. This may have the effect of making it easier for a user to process the data sheets.
[0023]Selectively storing the first identifier and the first indication may include saving the first identifier and the first indication in a first data set, such as a first data sheet. Accordingly, the method may also comprise determining, during the second interval, a second indication of whether the first user has provided a second input. The method may further comprise obtaining, during a second interval, a second identifier of an active window in the GUI. The method may also comprise storing the second identifier and the second indication, when the second identifier is different from the first identifier, or when the second indication is different from the first indication. The combination of an identifier and an indication may be referred to as an input status. Accordingly, this embodiment may have the effect of reducing storage requirements, since a second input status is only stored when the second input status differs from the most recent input status (in this case, the first input status.
[0025]Furthermore, protection may be implemented for the first data sheet and / or the second data sheet. This protection may achieve the result that the data of the first data sheet and the data of the second data sheet are protected from access by unauthorized users. Thus, the protection may prevent the user of the first computer from accessing the data of the first data sheet.
[0037]These and other aspects may have a number of advantages. One advantage may be that the tracking tool requires minimal installation. Put another way, the tracking tool is easy to install. In the context of a Microsoft Windows environment, installation of the tracking tool does not require registry changes or administrator access to the user computer (Windows is a trademark of Microsoft Corporation). In addition, the tracking tool does not require a dedicated server.
[0038]A further advantage may be that the tracking tool can operate under technical restrictions and / or requirements, particularly applying to an outsourcing environment. For example, in some embodiments the tracking tool does not require open TCP / IP ports on user computers (e.g. the first computer or the second computer) in order to enable monitoring and tracking of application usage. Opening a TCP / IP port on a computer may be understood as allowing an external application (i.e. an application on another computer) to initiate communication to the computer.
[0039]An additional advantage of the tracking tool may be that the tracking tool works without access to the Internet in order to function. Thus, the integrity of an organization's network perimeter may be preserved and / or a high level of security may be achieved.

Problems solved by technology

Using software tools currently available, it is often very difficult to monitor and track application usage in a standard and automated way.
Furthermore, computer network and application security requirements may constrain the development of a tool that enables application utilization to be efficiently tracked.
Network connectivity in an outsourcing environment may be limited to users and computers directed to perform a specific set of tasks.
Such solutions may necessitate extensive program development efforts and may violate security standards by requiring access to application source code; thus, it is often impossible to technically implement the monitoring and tracking solution.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring and Tracking Application Usage
  • Monitoring and Tracking Application Usage
  • Monitoring and Tracking Application Usage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055]In the following text, a detailed description of examples will be given with reference to the drawings. It should be understood that various modifications to the examples may be made. In particular, elements of one example may be combined and used in other examples to form new examples.

[0056]FIG. 1 shows a flow diagram of steps performed in order to install and use a tool for monitoring and tracking application usage, also referred to as a tracking tool. The tracking tool may be understood as a computer program that records or stores data describing the use of other computer programs on a computer system. For example, the tracking tool may record information regarding how long a computer program or application is used, and / or whether input to the computer system is provided. In some embodiments, the tracking tool may record information describing the usage of applications on a personal computer operated by a user.

[0057]At step 101, the tracking tool may be an attachment to an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present description refers to a computer-implemented method, a computer program product and a computer system for monitoring and tracking application usage, the method comprising: determining, during a first interval, a first indication of whether a first user has provided a first input. The method further comprising obtaining, during the first interval, a first identifier of an active window in a first graphical user interface (GUI), and selectively storing the first identifier and the first indication. For this purpose a specific tracking tool may be implemented on the computer on which the first graphical user interface is executed.

Description

BACKGROUND[0001]Using software tools currently available, it is often very difficult to monitor and track application usage in a standard and automated way. Furthermore, computer network and application security requirements may constrain the development of a tool that enables application utilization to be efficiently tracked.[0002]Monitoring and tracking of application usage may be particularly desirable due to globalization. Globalization and the proliferation of information technology enable tasks that were once performed locally within an organization to be performed in other locations and possibly by other organizations. It is often desirable for an organization to have tasks performed in an area where labor is more cost-effective and / or to take advantage of the expertise and / or specialization of another organization. It may also be useful for an organization to focus on its core business and outsource tasks unrelated to its core business to other organizations.[0003]Outsourcin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/048G06F17/00
CPCG06F11/3409G06F17/30905G06F11/3466G06F11/3476G06F2201/865H04L41/22H04L41/145G06F3/04883G06F17/24G06F3/0488H04L41/12G06F3/048G06F17/21H04L29/0899G06F11/3438G06F16/9577H04L67/75G06F40/10G06F40/166
Inventor MUKHOPADHYAY, TANMOYBHAT, VENUMADHAVA GANAPAYA
Owner ACCENTURE GLOBAL SERVICES LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products